An IBD editorial mentions the kind of news items that won’t be making the New York Times’ front page: Chinese steal thousands of secret documents from defense contractor’s computers, and a member of the US Joint Chiefs of Staff announces that the US intends to develop methods of retaliation for such attacks.
In outlining America’s cyberwarfare strategy last Thursday at the National Defense University, Deputy Secretary of Defense William Lynn disclosed that 24,000 sensitive files containing Pentagon data at a defense company were accessed in a cyberattack in March, likely by a foreign government.
He didn’t disclose the identity of that government, but in a bit of an understatement he acknowledged, “We have a pretty good idea.” So do we: the People’s Republic of China. In addition to conventional and nuclear weaponry, China has invested a great deal of time and treasure in what is known as “asymmetrical warfare” â€” the ability to exploit an enemy’s weakness rather than just try to match it tank for tank. …
Marine Gen. James Cartwright, vice chairman of the Joint Chiefs of Staff, said the Pentagon must shift its thinking on cybersecurity from focusing 90% of its energy on building a better firewall. “If your approach to the business is purely defensive in nature, that’s the Maginot line approach,” he said.
He was referring to the French fixed defensive fortifications that were circumvented by the Nazis at the outset of World War II. “There is no penalty for attacking (the U.S.) right now,” he added. We need the ability to retaliate and the will to do so. Call it mutual assured hacking after the deterrence doctrine of mutual assured destruction (MAD) during the Cold War.